G05B2219/35572

Common data pipeline for sharing data associated with industrial automation systems

A non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors of a first electronic device to receive data generated by a plurality of components of an industrial automation system and characterize one or more portions of the data by applying metadata to the one or more portions of the data. The metadata enables a second electronic device receiving the data to determine one or more contexts of the one or more portions of the data. Furthermore, the computer-executable instructions, when executed, cause the one or more processors to rearrange an order of the one or more portions of the data and cause the characterized and rearranged data to be sent to the second electronic device.

Firewall for encrypted traffic in a process control system

A method for decreasing the risk of unauthorized access to an embedded node in a secure subsystem of a process control system includes receiving a message comprising a message header and a message payload, and determining that the message is an unlock message configured to access one or more protected functions of the embedded node, at least by analyzing a bit sequence of one or more bits in the message header. The method also includes determining whether a manual control mechanism has been placed in a particular state by a human operator, and, based upon those determinations, either causing or not causing the embedded node to enter an unlocked state in which one or more of the protected functions are accessible.

COMMON DATA PIPELINE FOR SHARING DATA ASSOCIATED WITH INDUSTRIAL AUTOMATION SYSTEMS

A non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors of a first electronic device to receive data generated by a plurality of components of an industrial automation system and characterize one or more portions of the data by applying metadata to the one or more portions of the data. The metadata enables a second electronic device receiving the data to determine one or more contexts of the one or more portions of the data. Furthermore, the computer-executable instructions, when executed, cause the one or more processors to rearrange an order of the one or more portions of the data and cause the characterized and rearranged data to be sent to the second electronic device.

Firewall for Encrypted Traffic in a Process Control System
20190028437 · 2019-01-24 ·

A method for decreasing the risk of unauthorized access to an embedded node in a secure subsystem of a process control system includes receiving a message comprising a message header and a message payload, and determining that the message is an unlock message configured to access one or more protected functions of the embedded node, at least by analyzing a bit sequence of one or more bits in the message header. The method also includes determining whether a manual control mechanism has been placed in a particular state by a human operator, and, based upon those determinations, either causing or not causing the embedded node to enter an unlocked state in which one or more of the protected functions are accessible.